SecPoint - Best IT Security
The best Innovative and powerful IT Security products

You are here: SecPoint & IT Security News

DNS Trojan in iPhone unlock program

New kind of device is currently being used by online thugs in order to take control of the internet connections of different computers with Windows as its operating system. According to some security watchers, the new Trojan hides and masks itself as a tool that may be utilized in unlocking iPhones.
Even though this Trojan masquerades as an iPhone utility, this is not associated with the iPhone unit itself and only the Windows-operated computers are involved.

Scams begin with unwanted messages

Users might receive spam mails, which invites them to visit the site “iphone-iphone.info” and there will they become victims of this vicious tactic. Various links are available on this domain where one can download blackra1n.exe, an executable file for Windows OS.

Never be fooled by inviting applications

This tool presents the user the chance of unlocking their iPhones. However, the users do not receive this kind of benefit that they are actually expecting. Their computer systems are damaged in such a way that the DNS settings of the affected Windows-operated PC are altered. Thus, the hackers can take the control over the internet connections along the course.

Not as realistic as it may seem

Based on the statement made by a known Romanian anti-virus firm, BitDefender, the executable file was labeled as the Trojan-BAT-AACL. In addition, the said malicious software appeares as a component of a Windows batch file that is joined with the iPhone unlocking utility.
As explicated by BitDefender, the Trojan works by altering the chosen DNS server address into any of the numerous internet connections on the computers of the users. Hence, online criminals may gain access into the victims’ computer systems and interrupt any calls being made in order to get to the desired internet websites. The calls may also be passed on to the counterpart websites that contains malwares.

Old techniques are just recycled

This kind of scam has already been utilized before so as to transfer the online users into fake online banking websites. And, today, the malicious software is created in order to affect the computers being run by Windows operating systems. In this process, the web attackers may acquire benefit by receiving profits from other associates.

 

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef